Get a Pentest and security assessment of your IT network.

Cyber Security

Beyond MFA: Rethinking the Authentication Key

Two-factor authentication (2FA) using push text notifications has become the de-facto standard for login security. Bad actors have found a variety of ways to circumvent it, including phishing kits. Akamai recently published a blog post describing a phishing campaign that targeted banking customers in the UK by evading 2FA. Physical security keys introduce a new twist to 2FA, using a hardware-based key is a dongle you insert into your company laptop or other registered access device, authenticating the user.

Source: https://threatpost.com/mfa-rethinking-authentication-key/166136/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation